Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

GitLab Patch Stops Service Disruption Risks

May 22, 2025
Reading Time: 3 mins read
in Alerts
GitLab Patch Stops Service Disruption Risks

GitLab has recently issued critical security patches addressing eleven distinct software vulnerabilities. These patches affect both its Community Edition (CE) and Enterprise Edition (EE) platforms. Coordinated new versions 18.0.1 17.11.3 and 17.10.7 were simultaneously released to users. Three high-risk flaws enabling significant denial-of-service (DoS) attacks dominate the threat landscape. This security update is GitLab’s most comprehensive remediation effort so far in 2025. It impacts all GitLab deployment models including omnibus source code and helm chart installations. The most severe vulnerability CVE-2025-0993 allows authenticated attackers to trigger server resource exhaustion. This is done through an unprotected large blob endpoint scoring 7.5 on CVSS. This flaw could sustain prolonged system downtime in many unprotected production environments.

Two additional medium-severity denial-of-service (DoS) vectors were also identified and addressed. One such vulnerability CVE-2025-3111 exists within the platform’s Kubernetes integration feature. It exposes Kubernetes clusters to unbounded token generation attacks via inadequate input validation. Another flaw CVE-2025-2853 involves exploitable note positioning systems within GitLab’s interface. Attackers can exploit unvalidated note positions to effectively disrupt overall service availability. These vulnerabilities collectively enable attackers to launch multi-pronged attacks against infrastructure layers. A fourth DoS pathway also emerged through Discord third-party webhook integration points. This vulnerability is tracked as CVE-2024-7803 where malformed payloads can crash subsystems.

This highlights the growing attack surface from third-party platform integrations in DevOps.

Beyond just DoS threats the update addresses several critical system authentication related flaws. One notable flaw CVE-2024-12093 is a SAML validation weakness in specific conditions. It could allow specially modified responses to bypass important two-factor authentication requirements. This medium-severity vulnerability could potentially enable unauthorized account takeover by skilled attackers. The new patched release also successfully resolves the vulnerability tracked as CVE-2025-4979. Attackers could expose normally masked CI/CD variables by analyzing certain HTTP response data. This information disclosure flaw potentially exposes very sensitive credentials like API keys. Concurrently CVE-2025-0679 fixes a UI oversight that revealed users’ full email addresses. Low-severity flaws include branch name confusion and also unauthorized GraphQL job data access.

GitLab strongly mandates immediate upgrades by all users to these new patched software versions.

Versions 17.10.7 17.11.3 and 18.0.1 contain all fixes for the reported vulnerabilities. This particular release follows GitLab’s regular scheduled twice-monthly software patch update cadence. Security teams should review Kubernetes configurations webhooks and SAML implementations after updating. GitLab also recommends implementing outbound allowlists for SSRF protection and auditing CI/CD variables. Seven of the eleven fixed vulnerabilities were credited to various skilled external researchers. This was achieved through GitLab’s active HackerOne bug bounty program for security contributions. Enterprises should validate container images and also update runner configurations with core upgrades. This patch release underscores the critical need for continuous strong vulnerability management always.

Reference:

  • GitLab Critical Security Update Fixes Eleven Flaws And Denial Of Service Bugs
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMay 2025
ADVERTISEMENT

Related Posts

Chrome Extensions Leak Data And API Keys

Chrome Extensions Leak Data And API Keys

June 6, 2025
Chrome Extensions Leak Data And API Keys

AMOS Stealer Hits macOS Via Fake CAPTCHA

June 6, 2025
Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

June 6, 2025
UNC6040 Vishing Group Target Salesforce Data

UNC6040 Vishing Group Target Salesforce Data

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

New Chaos RAT Variant Hits Windows and Linux

June 5, 2025
New Chaos RAT Variant Hits Windows and Linux

FBI Warns Hedera NFT Airdrop Crypto Scam

June 5, 2025

Latest Alerts

AMOS Stealer Hits macOS Via Fake CAPTCHA

Chrome Extensions Leak Data And API Keys

BADBOX Turns 1M+ IoT Devices Into Proxies

FBI Warns Hedera NFT Airdrop Crypto Scam

New Chaos RAT Variant Hits Windows and Linux

UNC6040 Vishing Group Target Salesforce Data

Subscribe to our newsletter

    Latest Incidents

    German Dog Rescue IG Hacked For Ransom

    Hack Attempt Hits German Police Phone System

    InfoJobs Spain Hit By Credential Stuffing

    KiranaPro Startup Hacked All Data Wiped

    Nervos Bridge Paused After $3.9 Million Hack

    Ukraine GUR Claims Tupolev Data Theft Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial